{"id":7394,"date":"2022-05-25T12:05:49","date_gmt":"2022-05-25T19:05:49","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7394"},"modified":"2023-04-05T12:33:06","modified_gmt":"2023-04-05T19:33:06","slug":"cve-2022-22972-dhs-cisa-directs-federal-agencies-to-take-immediate-action-against-vmware-bugs","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/cve-2022-22972-dhs-cisa-directs-federal-agencies-to-take-immediate-action-against-vmware-bugs\/","title":{"rendered":"CVE-2022-22972: DHS CISA Directs Federal Agencies to Take Immediate Action Against VMware Bugs"},"content":{"rendered":"
\nDid you know that CSW\u2019s Cyber Threat Intelligence captured CVE-2022-22972 as a high probability of being exploited 62 days before the CISA warning?<\/p>\n<\/blockquote>\n
VMware released<\/a> two security holes (CVE-2022-22972 & CVE-2022-22973) in VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager on May 18, 2022. The more severe of all vulnerabilities is CVE-2022-22972, a critical authentication bypass affecting local domain users, which could be exploited by malicious actors with network access to the UI to obtain administrative access without the need to authenticate.<\/p>\n
On the same day, the U.S. Cybersecurity and Infrastructure Agency issued<\/a> an emergency security directive over VMware vulnerabilities, which threat actors are likely to exploit. The directive demands all Federal Civilian Executive Branch entities to either apply the patch or remove impacted VMware installations from agency networks by May 24, 2022.<\/p>\n
<\/p>\n
Likely to be Exploited<\/h2>\n